PART 2: TASTE OF CYBER RECAP

Decorative dot pattern
News
POSTED ON 16-May-24

On 13 March 2024 over 60 tertiary students and career transitioners had the opportunity to gain hands on cyber experience at Taste of Cyber. Co-hosted by Canberra Cyber Hub and University of Canberra, 6 Canberra Cyber businesses ran sessions on everything from Capture the Flag and Governance Risk and Compliance to encryption and cyber communication. In part 2 of the recap discover the key takeaways from activities ran by Viden, Ionize and Questacon. See part 1 of our recap here

 

Learn Encryption with Viden

Data is at the centre of everything we do in the digital world. Every image, document and video is made up of data, which is can easily be intercepted, read or changed by attackers without a way of keeping it private. That’s where encryption comes into play. Encryption is a way of encoding data, so that only those with the key can read it.

 

Using the power of mocktails, Viden showcased the power of and different types of encryption to participants - from the earliest encryption of the Caeser Cipher, where ancient letters were transcribed one letter off to keep their context hidden, to more modern encryption using algorithms which scramble data and are used to protect our computers, phones and electronic devices. Participants learned the key skill of cryptography, the processes of hiding information using encryption so that only the person who the message was intended for can read it. This is a key skill for any budding cyber professional.

 

To learn more about encryption and cryptography, visit: https://www.thalesgroup.com/en/markets/digital-identity-and-security/magazine/brief-history-encryption

 

Defend a Server with Ionize

Just like there are two sides to a coin, cyber security jobs generally fall into two categories. Referred to as red-team and blue-teams, both are important to improving organisation cyber security. Blue teams work to safeguard systems from attacks by responding to incidents and putting protection into place. Red teams work to identify weaknesses in a system by attacking and finding vulnerabilities.

 

In their activity Ionize demonstrated to students the role of red team and blue team in a scenario using free, open-source tools. This allowed students to explore the role of Security Operation Centres (SOCs) which provide cyber security defence of businesses and organisations. SOCs operate round the clock, with SOC analysts constantly monitoring organisation networks, systems, and applications for potential attacks. Ionize also showed participants how to set up a home style lab to progress their cyber skills in a SOC environment.

 

To learn how to set up your own home lab using open-source tools: https://sites.psu.edu/mariasoyosocapuder/how-to-build-your-own-homelab-for-cyber-security-testing/

 

Discover more about SOCs: https://www.ibm.com/topics/security-operations-center

 

Discover Cyber Communication with Questacon

Cyber security is more than being a solitary hacker in a basement. Cyber security teams must use teamwork and communication to solve problems to overcome threats. But how can you learn these key skills, while also exploring different cyber careers? Enter Questacon and their role-playing game Cyber Team Red: UnityCo Mission.

 

Participants at Taste of Cyber were among the first to play the new Cyber Team Red: UnityCo Mission. In teams of four they were challenged come together to form Cyber Team Red, an elite squad of cyber security specialists. Using their unique character abilities, participants worked together to identify the recipient of stolen data. While overcoming in game challenges participants explored aspects of social engineering and penetration testing. 

 

Questacon’s Cyber Team Red: UnityCo Mission is now available for download. Check out this activity for yourself: https://www.questacon.edu.au/learn-and-play/activities/cyber-team-red-unityco-mission